Mobile Applications
Mobile Application Security
Mobile Application Protection Suite (MAPS)
zScan
zKeyBox
zShield
zDefend
Mobile Devices
Mobile Device Security
Mobile Threat Defense (MTD)
MTD for Chromebooks
zSecure Resident Safety
Mobile Phishing Protection
Solutions
Mobile Security Solutions by Industry
Financial Services
Federal
Government
Media & Entertainment
Retail
Automotive
Company
Company
About Us
Blog
Careers
Support
Partners
Become a Partner
CONTACT US
☰
Menu
Mobile Applications
›
Mobile Application Security
›
Mobile Application Protection Suite (MAPS)
zScan
zKeyBox
zShield
zDefend
Mobile Devices
›
Mobile Device Security
›
Mobile Threat Defense (MTD)
MTD for Chromebooks
zSecure Resident Safety
Mobile Phishing Protection
Solutions
›
Mobile Security Solutions by Industry
›
Financial Services
Federal
Government
Media & Entertainment
Retail
Automotive
Company
›
Company
›
About Us
Blog
Careers
Support
Partners
›
Become a Partner
Posts about Threat Research (11)
Zimperium Customers Protected From Monokle Malware
Android
2 minutes
Jul 26, 2019
According to Threatpost, another new malicious Android app - dubbed “Monokle”- is gaining attention. While Monokle has some interesting capabilities
The State of Mobile Device Threats: 2019 H1 Mobile Threat Report
Threat Research
1 minutes
Jul 23, 2019
As the worldwide leader in mobile threat defense (MTD), no company protects more enterprise mobile devices than Zimperium. As a result, we have incredibly
Latest Android Malware is Not a Surprise; Zimperium Customers Protected
Android
3 minutes
Jul 15, 2019
According to news reports, a new strain of Android malware has infected 25 million devices and modified legitimate apps with a malicious ads module.
5 Must-Have Sections For Every Enterprise Mobile Security RFP - Must-Have #4: Security Technology & Workflow Integrations
Threat Research
1 minutes
Jul 09, 2019
Our fourth webinar in our series of “The 5 Must-Have Sections for Every Enterprise Mobile Security Request For Proposal (RFP)” reviews Security
The Mobile Watering Hole: How A Sip Leads to A Trojan Compromise
Threat Research
67 minutes
Jun 17, 2019
"Watering Hole" is a cyber attack strategy in which the victim is a particular group (organization, industry, or region). In this attack, the attacker
WhatsApp Buffer Overflow Vulnerability: Under the Scope
Android
10 minutes
Jun 14, 2019
Researcher: Chilik Tamir (@_coreDump) Recently, Zimperium blogged about the new WhatsApp vulnerability disclosed by Facebook on May 13th. This
CVE-2019-8545: Vulnerability in IOHIDFamily.kext
Threat Research
1 minutes
Jun 10, 2019
Summary A local user may be able to cause unexpected system termination or read kernel memory. Details In the function
It’s Not Your Father’s Endpoint - What if a Mobile Device is Attacked?
Threat Research
2 minutes
May 20, 2019
In my first blog, I discussed why mobile devices are the likely choice for savvy attackers since they typically have no endpoint protection. Let's
9
10
11
12
13